2019
DOI: 10.1016/j.comcom.2018.11.005
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic key management algorithms in wireless sensor networks: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 76 publications
(52 citation statements)
references
References 25 publications
0
52
0
Order By: Relevance
“…In security policy key management is a very important factor. Broadcast secure authentication protocols supports for key management in WSN.Ultimately three types of key formation protocols used in WSN:-1.Hybrid 2.Probabilistic 3.Deterministic [22].…”
Section: A Routingmentioning
confidence: 99%
“…In security policy key management is a very important factor. Broadcast secure authentication protocols supports for key management in WSN.Ultimately three types of key formation protocols used in WSN:-1.Hybrid 2.Probabilistic 3.Deterministic [22].…”
Section: A Routingmentioning
confidence: 99%
“…Backward secrecy: The members that are wishing to join the cluster should not receive any past keying materials [41,45].…”
Section: A Gkm Security Requirementmentioning
confidence: 99%
“…It can also adapt highly dynamic membership, and frequent key re-distribution was generally provided by these features. But, these features were widely end up by both distributed and decentralized GKM methods [45].…”
Section: Suggestion For Further Studymentioning
confidence: 99%
“…It is shown in historical examples that the attack cost of key management is much less than the decoding algorithm. Therefore, in WSN security research, it is very important to attach great importance to the key management and introduce the key management schemes for effective control, which can increase the security and anti-attack of the network [10][11][12].…”
Section: Introductionmentioning
confidence: 99%